Conferences related to Computer viruses

Back to Top

2019 41st Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC)

The conference program will consist of plenary lectures, symposia, workshops andinvitedsessions of the latest significant findings and developments in all the major fields ofbiomedical engineering.Submitted papers will be peer reviewed. Accepted high quality paperswill be presented in oral and postersessions, will appear in the Conference Proceedings and willbe indexed in PubMed/MEDLINE & IEEE Xplore


2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)

Promote the exchange of ideas between academia and industry in the field of computer and networks dependability


2019 IEEE 16th International Symposium on Biomedical Imaging (ISBI)

The IEEE International Symposium on Biomedical Imaging (ISBI) is the premier forum for the presentation of technological advances in theoretical and applied biomedical imaging.ISBI 2019 will be the 16th meeting in this series. The previous meetings have played a leading role in facilitating interaction between researchers in medical and biological imaging. The 2019 meeting will continue this tradition of fostering cross fertilization among different imaging communities and contributing to an integrative approach to biomedical imaging across all scales of observation.


2019 IEEE 58th Conference on Decision and Control (CDC)

The CDC is recognized as the premier scientific and engineering conference dedicated to the advancement of the theory and practice of systems and control. The CDC annually brings together an international community of researchers and practitioners in the field of automatic control to discuss new research results, perspectives on future developments, and innovative applications relevant to decision making, systems and control, and related areas.The 58th CDC will feature contributed and invited papers, as well as workshops and may include tutorial sessions.The IEEE CDC is hosted by the IEEE Control Systems Society (CSS) in cooperation with the Society for Industrial and Applied Mathematics (SIAM), the Institute for Operations Research and the Management Sciences (INFORMS), the Japanese Society for Instrument and Control Engineers (SICE), and the European Union Control Association (EUCA).


2019 IEEE SENSORS

The IEEE Sensors Conference is a forum for presentation, discussion, and exchange of state-of-the art information including the latest research and development in sensors and their related fields. It brings together researchers, developers, and practitioners from diverse fields including international scientists and engineers from academia, research institutes, and companies to present and discuss the latest results in the general field of sensors.

  • 2018 IEEE SENSORS

    The IEEE Sensors Conference is a forum for presentation, discussion, and exchange of state -of-the art information including the latest research and development in sensors and their relatedfields. It brings together researchers, developers, and practitioners from diverse fields includinginternational scientists and engineers from academia, research institutes, and companies topresent and discuss the latest results in the general field of sensors.

  • 2017 IEEE SENSORS

    The IEEE Sensors Conference is a forum for presentation, discussion, and exchange of state -of-the art information including the latest research and development in sensors and their relatedfields. It brings together researchers, developers, and practitioners from diverse fields includinginternational scientists and engineers from academia, research institutes, and companies topresent and discuss the latest results in the general field of sensors.

  • 2016 IEEE Sensors

    The IEEE Sensors Conference is a forum for presentation, discussion, and exchange of state -of-the art information including the latest research and development in sensors and their related fields. It brings together researchers, developers, and practitioners from diverse fields including international scientists and engineers from academia, research institutes, and companies to present and discuss the latest results in the general field of sensors.

  • 2015 IEEE Sensors

    The IEEE Sensors Conference is a forum for presentation, discussion, and exchange of state -of-the art information including the latest research and development in sensors and their related fields. It brings together researchers, developers, and practitioners from diverse fieldsincluding international scientists and engineers from academia, research institutes, and companies topresent and discuss the latest results in the general field of sensors.

  • 2014 IEEE Sensors

    The IEEE Sensors Conference is a forum for presentation, discussion, andexchange of state -of-the art information including the latest research and development in sensors andtheir related fields. It brings together researchers, developers, and practitioners from diverse fieldsincluding international scientists and engineers from academia, research institutes, and companies topresent and discuss the latest results in the general field of sensors.

  • 2013 IEEE Sensors

    The IEEE SENSORS Conference is a forum for presentation, discussion, and exchange of state -of-the art information including the latest research and development in sensors and their related fields. It brings together researchers, developers, and practitioners from diverse fields including international scientists and engineers from academia, research institutes, and companies to present and discuss the latest results in the general field of sensors.

  • 2012 IEEE Sensors

    The IEEE Sensors Conference is a forum for presentation, discussion, and exchange of state-of-the art information including the latest research and development in sensors and their related fields. It brings together researchers, developers, and practitioners from diverse fields including international scientists and engineers from academia, research institutes, and companies to present and discuss the latest results in the general field of sensors.

  • 2011 IEEE Sensors

    The IEEE Sensors Conference is a forum for presentation, discussion, and exchange of state-of-the art information including the latest research and development in sensors and their related fields. It brings together researchers, developers, and practitioners from diverse fields including international scientists and engineers from academia, research institutes, and companies to present and discuss the latest results in the general field of sensors. IEEE SENSORS 2011 will include keynote addresses by eminen

  • 2010 IEEE Sensors

    The IEEE SENSORS 2010 Conference is a forum for state-of-the-art presentations on sensors and related topics covering from theory to application, device to system, modeling to implementation and from macro/nano to scale.

  • 2009 IEEE Sensors

    IEEE Sensors Conference 2009 is intended to provide a common forum for researchers, scientists, engineers and practitioners throughout the world to present their latest research findings, ideas, developments and applications in the area of sensors and sensing technology. IEEE Sensors Conference 2009 will include keynote addresses by eminent scientists as well as special, regular and poster sessions.

  • 2008 IEEE Sensors

    IEEE SENSORS 2008 solicits original and state-of-the-art contributions to sensors and related topics, covering from theory to application, from device to system, from modeling to implementation, and from macro to micro/nano in scale. Topics of interest include,but are not limitid to: Phenomena, Modeling, and Evaluation (Novel Sensing Principles, Theory and Modeling, Sensors Characterization, Evaluation and Testing, Data Handling and Mining) Chemical and Gas Sensors (Materials, Devices, Electronics N

  • 2007 IEEE Sensors

    IEEE SENSORS 2007 solicits original and state-of-the-art contributions to sensors and related topics, covering from theory to application, from device to system, from modeling to implementation, and from macro to micro/nano in scale.

  • 2006 IEEE Sensors

  • 2005 IEEE Sensors

  • 2004 IEEE Sensors

  • 2003 IEEE Sensors

  • 2002 IEEE Sensors


More Conferences

Periodicals related to Computer viruses

Back to Top

Aerospace and Electronic Systems Magazine, IEEE

The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.


Automatic Control, IEEE Transactions on

The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...


Biomedical Engineering, IEEE Transactions on

Broad coverage of concepts and methods of the physical and engineering sciences applied in biology and medicine, ranging from formalized mathematical theory through experimental science and technological development to practical clinical applications.


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Computational Biology and Bioinformatics, IEEE/ACM Transactions on

Specific topics of interest include, but are not limited to, sequence analysis, comparison and alignment methods; motif, gene and signal recognition; molecular evolution; phylogenetics and phylogenomics; determination or prediction of the structure of RNA and Protein in two and three dimensions; DNA twisting and folding; gene expression and gene regulatory networks; deduction of metabolic pathways; micro-array design and analysis; proteomics; ...


More Periodicals

Most published Xplore authors for Computer viruses

Back to Top

No authors for "Computer viruses"


Xplore Articles related to Computer viruses

Back to Top

IEE Colloquium on 'Viruses and their Impact on Future Computing Systems' (Digest No.132)

IEE Colloquium on Viruses and their Impact on Future Computing Systems, 1990

None


Flow Based Botnet Detection

2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC), 2009

Botnet is a collection of computer hosts exploited by malicious software that is remotely controlled through a command and control channel. More new types of attacks invented based on Botnets. Because of usage of legitimate IRC (Internet Relay Chat) servers to command and control the bots, it is hard to detect and remove Botnets. Flow information may keep the fingerprint ...


System architecture for interactive rome tv services

IEEE International Symposium on Consumer Electronics, 2004, 2004

None


Modeling Virus Propagation in Peer-to-Peer Networks

2005 5th International Conference on Information Communications & Signal Processing, 2005

The popularity of peer-to-peer (P2P) networks makes them an attractive target to the creators of viruses and other malicious code. Indeed, recently a number of viruses designed specifically to spread via P2P networks have emerged. In this paper we present a model which predicts how a P2P-based virus propagates through a network. This model is a modified version of the ...


Analysis and Checking of Safety Transition System Based on TLA+

2008 4th International Conference on Wireless Communications, Networking and Mobile Computing, 2008

With all viruses and computer hackers, online banking security especially the process of payment could not be protected. The majority banks adopt many methods to guarantee the security, but if someone gets the account number and password, he can do anything in Internet and the bank has little way to prevent. So we need greater security in the process of ...


More Xplore Articles

Educational Resources on Computer viruses

Back to Top

IEEE-USA E-Books

  • IEE Colloquium on 'Viruses and their Impact on Future Computing Systems' (Digest No.132)

    None

  • Flow Based Botnet Detection

    Botnet is a collection of computer hosts exploited by malicious software that is remotely controlled through a command and control channel. More new types of attacks invented based on Botnets. Because of usage of legitimate IRC (Internet Relay Chat) servers to command and control the bots, it is hard to detect and remove Botnets. Flow information may keep the fingerprint of bots and can be used to identify IRC-based Botnets. The proposed method applies flow correlation for grouping the same activities of the same IRC-based bots. After flow correlation, the normal IRC and abnormal IRC traces are identified by scoring technique.

  • System architecture for interactive rome tv services

    None

  • Modeling Virus Propagation in Peer-to-Peer Networks

    The popularity of peer-to-peer (P2P) networks makes them an attractive target to the creators of viruses and other malicious code. Indeed, recently a number of viruses designed specifically to spread via P2P networks have emerged. In this paper we present a model which predicts how a P2P-based virus propagates through a network. This model is a modified version of the S-E-I (susceptible- exposed-infected) model from the field of epidemiology. Our model classifies each peer as falling into one of three categories based on the number of infected files it is sharing. We derive differential equations which comprise the deterministic model and examine the expected behaviour of the P2P network as predicted by these equations

  • Analysis and Checking of Safety Transition System Based on TLA+

    With all viruses and computer hackers, online banking security especially the process of payment could not be protected. The majority banks adopt many methods to guarantee the security, but if someone gets the account number and password, he can do anything in Internet and the bank has little way to prevent. So we need greater security in the process of payment. TLA is One kind of logic brought forward by Leslie Lamport[1]. And its syntax and complete formal semantics are summarized in about a page. TLA is extremely powerful, both in principle and in practice. Yet, there have no theory about safety transition system in it. And then we put forward the definitions of safety state, safety transition condition, safety action, safety run, safety transition system and the theorem which proof that every state in safety transition system is safe; then, specify Internet banking using TLA+ which is based on safety transition system. In the specification several accounts and the intruder are in a concurrency system, they communicate through a channel, and the specification is tested by TLC. The results show that the system based on safety transition is more secure.

  • Mobile agents: overcoming early hype and a bad name

    When faced with the term "mobile agent", most software developers imagine, at best, maintenance, visualization, or debugging problems that would make mobile agents difficult to use in any production application. At worst, they imagine security problems that would make mobile agents only one step short of viruses and worms. Even those software developers who recognize these two visions as exaggerated often dismiss mobile agents as a technology that does not provide any benefits over their normal distributed-computing practices. These developer biases arise from reasons both simple - early unrealized hype and an unfortunate name - and profound -legitimate concerns about security, efficiency, and programmer convenience. To overcome the biases, the mobile- agent community must view their current systems only as excellent vehicles for exploring the hard research problems, and must make an intense effort to move individual mobile-code ideas and techniques into simpler, but initially more palatable, mobile-code systems.

  • Impulsive Control of the Spread of Worms

    A SIR epidemic model with dynamic input-output property is presented. The dynamics of this model under pulse control are analyzed which we referred to as the worms propagation with impulsive control (WPIC) model. For the WPIC model we established the conditions and threshold to the existence of the disease-free T-periodic solution and proved that the disease-free T-periodic solution is globally asymptotically stable.

  • Epidemics of Mobile Worms

    Mathematical epidemiology has been developing for over a hundred years. Mathematical models developed for spreading of viruses in human populations take into account various effects influencing the epidemic. Recently results of mathematical epidemiology have also been applied to modeling of epidemic viruses in computer networks. The current work applies results of mathematical epidemiology to the research of dynamics of potential epidemics of worms in mobile networks. The work simulates epidemics of two types of mobile worms that we have already run into - MMS and Bluetooth worms.

  • A New Approach to Early Detection of an Unknown Worm

    Recently, many worms such as Sassar worm or MS Blaster worm, had made serious damages to many hosts on Internet. These worms spread and damage many hosts on Internet by exploiting vulnerability of network application and/or operating system. Infection of worms that exploit the vulnerability of software can be prevented by applying proper software patches. However, it is impossible to prevent an infection of worms that exploit unknown vulnerability by only that method. In this paper, we propose a new method for detecting unknown worms by using hop number distribution of packets received by a host. We also present a system design for real time detection of unknown worms' activity by employing the proposed method.

  • A Growing Network Model with High Hub Connectivity and Tunable Clustering Coefficient

    The paper suggests a model for social network based on a growing network. The model we propose can fit the following two properties: (1) 'scale-free property' which has power law degree distribution, and (2) 'small-world property' which has high clustering coefficient. In addition, the model is modified to match the s-metric property. The s-metric property describes the level of high degree nodes connected to other ones, which was proposed in 2005.



Standards related to Computer viruses

Back to Top

No standards are currently tagged "Computer viruses"


Jobs related to Computer viruses

Back to Top